And we have the alumni to prove it. Join the more than 1 million working adults who had the courage to pursue their degrees and the determination to earn them. Fill out our free online application today.

And we have the alumni to prove it. Join the more than 1 million working adults who had the courage to pursue their degrees and the determination to earn them. Fill out our free online application today.

MORE WAYS TO SAVE ON TUITION

And we have the alumni to prove it. Join the more than 1 million working adults who had the courage to pursue their degrees and the determination to earn them. Fill out our free online application today.

And we have the alumni to prove it. Join the more than 1 million working adults who had the courage to pursue their degrees and the determination to earn them. Fill out our free online application today.

College of IS&T in the News

Latest Stories

This radio interview featuring Kirsten Hoyt, the Academic Dean for the College of IS&T, talks about the contributions of women to technology, the growing gender gap in IT, what University of Phoenix is doing to help close that gap and the projected shortage of IT professionals.

Dan Konzen, Campus College Chair for the College of IS&T, shares his findings from a recent UOPX survey on social media hacking and provides tips to make personal information more secure on social media. Dan shared with reporters his ability to perform a live hack of Facebook, where he bypasses security settings designed to hide personal information and demonstrates how easy it is for hackers to access info like birth dates and addresses.

Big Data is reshaping the world and only time will tell whether this is good or bad for our society. Americans and consumers across the globe disseminate all types of information. Health records, financial data and personal Internet browsing habits fill a massive pool of data that can be mined for patterns and trends to positively effect changes in society. But just as easily, this data is a threat to the personal information of individuals and society as a whole. Read this article to learn the promise & pit falls of big data and how you can ensure we get the most out of our big data.

According to a new University of Phoenix study, adults are being smarter and safer online. However, many still do not have identity theft protection. Kirsten Hoyt , Academic Dean for the College of Information Systems and Technology, says securing your browser is an important step. Listen to this 30-second radio story for tips on how to keep yourself safe online.

Even though students are taking greater interest in science, technology, engineering and math (STEM), women are still poorly represented in these career fields. Dr. Charity Jennings, former program dean for the University of Phoenix College of Information Systems and Technology says, "To cultivate and sustain diverse perspectives and expand the pipeline of IT talent…it’s critical to get our young women engaged and excited about becoming future engineers, web developers, tech entrepreneurs and executives.” Read about tips for nurturing your daughter’s interest in technology.

IT Business Edge listed its top 25 cyber security companies to watch in 2015. Some are well-known security vendors, and some are unknown names preparing for a breakout.

Cyber security is becoming big business as cyber threats are on the rise and the tactics being used by criminals are more sophisticated and harder to catch. Venture capitalists poured $2.3 billion into cyber security companies in 2014.

What sets top cyber security companies apart from the field? Dennis Bonilla, executive dean for the College of Information Systems & Technology at University of Phoenix, explains:

Cyber security protocols and expertise must be the right fit with the business you are working with.

Company representative should understand how to integrate security protocols into the client’s operations

Top firms have robust threat assessment and timely response protocols.

Top firms are willing to adapt to the evolving threat landscape and meet the challenges of ever-changing technologies and regulations.

Qualified individuals partnering with companies should have practical experience, appropriate education and professional certifications to certify their competency.

There is currently a greater demand for software development talent than there is a supply of professionals available.

According to the latest Technology Councils of North America survey, 51 percent of the 760 technology employers surveyed said the main reason for the software development talent shortage is the lack of qualified workers in the local market.

With 69 percent of employers taking action to address the software development talent shortage, Dennis Bonilla, executive dean for the College of Information Systems & Technology, says “University of Phoenix® is working with more companies to find the needed talent to either match students with those jobs or develop curriculum to fill these gaps.” University of Phoenix has aligned its curriculum to make sure people can come in and get a degree or certificate to fill the jobs gap.

The University is also holding technology conferences to help students learn about the industry and the skills they need to work in software development.

“The wearable technologies we’re seeing on the market now are early, clunky versions of what’s coming soon. In the future your smartwatch will instantly access your medical records, diet and training logs, then sync them with sensors in the supermarket and mall to provide real time shopping and health advice.”–Dennis Bonilla, Executive Dean for University of Phoenix–College of IS&T

In just one year, companies selling wearable technology went from occupying a small aisle at the Consumer Electronics Show in Las Vegas to a quarter of the exhibit hall floor space, and interest in wearables is continuing to grow.

The wave of the future for wearable devises will be around actionable insights. How can you get personal instructions based on the information that your wearable device is collecting?

This article provides a growing list of technology options that are on the market around health and exercise.

“Cyber threats pose one of the gravest national security dangers the United States faces. They jeopardize our country’s critical infrastructure, endanger our individual liberties and threaten every America’s way of life.” – President Barack Obama

National Cybersecurity Awareness Month in October offers a chance to call attention to the role everyone can play in making cyberspace more secure. This article offers many interesting stories around cyber security, such as:

The Chinese government’s alleged role in creating a remote access Trojan that targeted at Hong Kong pro-democracy activists via their mobile phones.

The fact that nearly 2/3 of millennials are unaware of the potential for a career in cybersecurity and what tasks and responsibilities cybersecurity jobs entail.

McAfee’s report showing that Jimmy Kimmel as the #1 ‘most dangerous’ celebrity for the internet. There is a one-in-five chance you’ll hit something malicious when searching for Jimmy Kimmel.

A PwC survey that found nearly 43 million cyber incidents this year, up 48% from last year. The average annual loss due to cyber incidents was $2.7 million, up 34% from 2013.

According to a survey released by the University of Phoenix, Americans are more concerned with identity theft and personal cybersecurity than any other security threats. Of those surveyed, 70 percent said identify theft is among the areas they are most concerned with, while 61% cited personal cybersecurity as a concern.

The (ISC)2 Foundation and University of Phoenix recently conducted a National Roundtable on Cybersecurity Workforce Competencies. The 15 cybersecurity experts and thought leaders who took part in the roundtable identified three main gaps in the cybersecurity workforce readiness:

The competency gap

The professional experience gap

The speed-to-market gap

Recommendations are given to higher education institutes on how they can fix these gaps.

The (ISC)2 Foundation and University of Phoenix recently conducted a National Roundtable on Cybersecurity Workforce Competencies. The 15 cybersecurity experts and thought leaders who took part in the roundtable identified three main gaps in the cybersecurity workforce readiness:

The competency gap

The professional experience gap

The speed-to-market gap

Recommendations are given to higher education institutes on how they can fix these gaps.

Stay Connected

Watch on-demand webcasts from our College of IS&T Deans, Faculty and Staff members talking about current trends and hot topics in the world of technology.